COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority...

54

Transcript of COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority...

Page 1: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic
Page 2: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

COMPUTER SECURITY INCIDENT

DEFINITION

“Any real or suspected adverse event in relation to the security of computer system or

computer networks”

- (According to ‘CIRT FAQ’) in CERT/CC

A single or a series of unwanted or unexpected computer security events that have a

significant probability of compromising business operations and threatening

cybersecurity.

- ISO Definition

Page 3: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

There are no standard types for security Incidents!

Page 4: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

Incident Samples

INTRODUCTION

Scan activity to firewall servers

Information leakage

Compromised server

Intrusion

Use of proxy server as open proxy

Virus infection

Laptop Theft

Botnet and C&C

Identity Theft

Web defacement

Phishing sites

Espionage

DoS / DDoS attacks

SMTP relay

SPAM

Malware distribution

One-Click Fraud

Unauthorized Access

Page 5: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT RESPONSE

INTRODUCTION

Process of addressing computer security incidents

Detect Analyse Limit

General Goals:

• Progress of the incident is halted

• Affected systems return to normal operations

• Observe system for unexpected behaviour or anything

suspicious

• Investigate anything considered unusual

• If the investigation finds something that isn’t explained by

authorized activity, immediately initiate response procedures

Page 6: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

NEED FOR INCIDENT RESPONSE

INCIDENT RESPONSE

• Even the most vigilant, secure organizations can come up against acts of fraud, theft, computer intrusions, and other

computer security incidents.

• Without up-front planning for Incident Response, it is much more difficult to recover from an incident.

Page 7: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

POLICIES & PROCEDURES

INCIDENT RESPONSE

• Established procedures must be in place to:

Detect & identify the attack

Mitigate the damage

Recover from the attack

• Without a formal process in place critical information may be lost

These procedures used in incident response can be thought of

as the incident handling life cycle.

Page 8: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT HANDLING LIFE CYCLE

INCIDENT RESPONSE

Source: CERT/CC Incident Handling Life Cycle in CERT/CC “Handbook for Computer Incident Response Teams (CIRTs)

Other

IDS

Hotline/Helpdesk

Call Center

Email

Triage

Information

Request

Vulnerability

Report

Incident

Report

Coordinate

information

& Response

Analyze Obtain Contact

Information

Provide Technical

Assistance

Resolution

Page 9: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

SAMPLE OBJECTIVES

INCIDENT RESPONSE

• Provide support for recovering from and dealing with incidents

• Provide technical support in response to computer security incidents

• Help to stop attack

• Contain the damage

• The objective for the Incident Response will be derived from the CIRT mission statement

Page 10: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

ELEMENTS

INCIDENT RESPONSE

Categorisation

Prioritisation

Classification

No consensus has emerged in the security community as to which taxonomy is the best

Prioritisation of incidents is based on multiple factors.

Classification of an incident is done based on the mission, operation field and other related elements.

Page 11: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT HANDLING

Page 12: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

PLAYERS INVOLVED

INCIDENT HANDLING

IH Procedure Players

Your CIRT

A Reporter

Victim

Attacker

LEA

ISP

Other CIRTs

Page 13: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

LIFECYCLE IN A CIRT PERSPECTIVE

INCIDENT HANDLING

Preparation

Receiving & Triage

Identification & Analysis

Containment

Eradication & Recovery

Follow Up

Page 14: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

PREPARATION

INCIDENT HANDLING

To respond to incident, the incident handling methodologies are very important.

• Communication & Facilities• Email• Telephone• Internal Communication• POC (Point of Contact) List

• Hardware & Software• Incident Response Systems• Information Gathering Systems• Mail / Web /dB Servers• Monitoring system• Remote Access• Printer & FAX• Shredder• Whiteboard & Projector• Notebook Computers

• Policy & Procedure• Security Policy• Security Plan• Incident Response Policy• Incident Response Plan• Resource Availability• Capacity Building• RFC 2350 "Expectations for Computer Security

Incident Response”• Types of Incidents and Level of Support• Co-operation, Interaction and Disclosure of

Information• Communication and Authentication

Page 15: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

PREPARATION

INCIDENT HANDLING

To respond to incident, the incident handling methodologies are very important.

•Building Relationship with key players•Law Enforcement•Human Resource•System Administrators•Legal Counsel•Fellow Incident Handlers

•Response Kit•Onsite assignments•Quick Response Enablers

•Communication Plan•In-band Communication•Out-band Communication•Build a central point of contact

•Incidents checklist•Checklists are guidelines•Incident checklist are like memory joggers

•Don’t use checklist as the 10 Commandments

•Perform threat modeling•What are the kinds of attacks?•What are the incident the team might encounter – technical and physical?

•How will we prepare for the incident?•How will we identify the incident?•How will we contain the incident?•How will we eradicate the incident?•How will we recover from the incident?•How will we capture the lessons learned from the incident?

Incident handlers need to practice working incidents to hone their skills.

One way to do this is to take part in cyber drill at security conferences.

Also work with other incident handlers in the area to set up practice sessions.

Page 16: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT RESPONSE STRUCTURE: EXAMPLE

INCIDENT HANDLING

Page 17: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT HANDLING SYSTEMSINCIDENT HANDLING

Page 18: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

BASICS

INCIDENT HANDLING

Receiving TriageIdentification

& AnalysisContainment

Eradication & Recovery

Follow Up

Page 19: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

BASICS : PREPERATION

INCIDENT HANDLING

To respond to incident, the incident handling methodologies are very important

• Communication & Facilities

• External

• Internal

• Template

• Hardware & Software

• Policy & Procedure

Page 20: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT HANDLING

RECEIVING

Page 21: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

RECEIVING

INCIDENT HANDLING

Elements that allow the CIRT to receive incidents.

CIRT can rely on humans/machines/autonomus systems to report incidents.

Some of the common systems that allows the CIRT to receive incidents are:

• Phone

• Email

• Portal

• Fax

• SMS

Page 22: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TYPICAL INCIDENT REPORTING FORMAT

INCIDENT HANDLING

Contact Info

• Name

• Organization Name

• Division

• E-mail address or FAX number

Purpose of Reporting

• Question

• Information providing

• Request to coordination

• Other

Summary of the Incident

• Source IP address or hostname

• Description about the incident

• System information of the system

• IP address or hostname

• Protocol / Port number

• Hardware / OS

• Timestamp

• Time zone

Log Information

Page 23: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT HANDLING

TRIAGE

Page 24: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE

INCIDENT HANDLING

In hospital, where patients who need to be attended immediately are separated from those who can wait for assistance.

• Sorting, Categorizing, Prioritizing

• Depending on resources available

• Type

• Incident, Vulnerability, Virus, Information

• New report or related on-going report?

• If on-going report, is it part of an existing Incident? Same IP address?

• Linkage between separate reports

• Tracking number?

Page 25: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE

INCIDENT HANDLING

Triage helps the incident handlers optimize the time taken for incident handling as well as perform effective incident handling.

Categorization

Priority

Human Resource

Relevance

Incident

Identify & Track

Page 26: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE: PRIORITY

INCIDENT HANDLING

Due to limited resource and the growing number of incident reports, we may not be able to respond to every incidents reported to us.

• Resource needed to deal with it

• Impact on constituency

• Category of incident

• Type or extent of damage

• Target or source of an attack

Page 27: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE

INCIDENT HANDLING

Classification vs. Categorization

Page 28: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

ELEMENTS

INCIDENT RESPONSE

Incident Class (mandatory input field)

Incident Type(optional but desired input field)

Description / Examples

Abusive Content

Spamor "Unsolicited Bulk Email", this means that the recipient has not granted verifiable permission for the message to be sent and that the message is sent as part of a larger collection of messages, all having an identical content.

Harassment Discreditation or discrimination of somebody (i.e. Cyberstalking)

Child/Sexual/Violence/... Child Pornography, glorification of violence, ...

Malicious Code

Virus

Software that is intentionally included or inserted in a system for a harmful purpose. A user interaction is normally necessary to activate the code.

Worm

Trojan

Spyware

Dialer

Information Gathering

Scanning Attacks that send requests to a system to discover weak points. This includes also some kind of testing processes to gather information about hosts, services and accounts. Examples: fingerd, DNS querying, ICMP, SMTP (EXPN, RCPT, …).

Sniffing Observing and recording of network traffic (wiretapping).

Social EngineeringGathering information from a human being in a non-technical way (e.g. lies, tricks, bribes, or threats).

Page 29: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE: PRIORITY

INCIDENT HANDLING

High

• Urgent report like phishing

• Incident still active

• Have to coordinate to other organization

Middle

• Not urgent report

• Not active incident

• Will coordinate to other organization

Low

• Just a technical question to answer

• Just a FYI to us

• Others

Page 30: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE AND INCIDENT HANDLING

LETS DO A QUICK EXERCISE

Page 31: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

Incident Class(mandatory input field)

Incident Type(optional but desired input field)

Description / Examples

Abusive Content

Spam ‘Unsolicited bulk e-mail’, which means that the recipient has not granted verifiable permission for the message to be sent and that the message is sent as part of a larger collection of messages, all having an identical content.

Harassment Discrediting, or discrimination against, somebody (ie, cyber stalking)

Child/Sexual/Violence/... Child pornography, glorification of violence, ...

Malicious Code

Virus

Software that is intentionally included or inserted in a system for a harmful purpose. A user interaction is normally necessary to activate the code.

Worm

Trojan

Spyware

Dialer

TRIAGE: CLASSIFICATION

INCIDENT HANDLING

Page 32: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

Incident Class(mandatory input field)

Incident Type(optional but desired input field)

Description / Examples

InformationGathering

Scanning Attacks that send requests to a system to discover weak points. This includes also some kinds of testing processes to gather information about hosts, services and accounts. Examples: fingerd, DNS querying, ICMP, SMTP (EXPN, RCPT)

Sniffing Observing and recording network traffic (wiretapping).

Social Engineering Gathering information from a human being in a non-technical way (eg, lies, tricks, bribes, or threats).

Intrusion Attempts

Exploiting Known Vulnerabilities

An attempt to compromise a system or to disrupt any service by exploiting vulnerabilities with a standardised identifier such as a CVE name (eg, buffer overflow, backdoors, cross side scripting, etc).

Login Attempts Multiple login attempts (Guessing or cracking passwords, brute force).

New Attack Signature An attempt using an unknown exploit.

TRIAGE: CLASSIFICATION

INCIDENT HANDLING

Page 33: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

Incident Class(mandatory input field)

Incident Type(optional but desired input field)

Description / Examples

Information Security

Unauthorised Access to Information

Besides the local abuse of data and systems, information security can be endangered by a successful account or application compromise. Furthermore, attacks that intercept and access information during transmission (wiretapping, spoofing or hijacking) are possible.

Unauthorised Modification of Information

Fraud

Unauthorized Use of Resources Using resources for unauthorised purposes, including profit-making ventures (eg, the use of e-mail to participate in illegal chain letters for profit or pyramid schemes).

Copyright Selling or installing copies of unlicensed commercial software or other copyright protected materials (Warez).

Masquerade Type of attacks in which one entity illegitimately assumes the identity of another in order to benefit from it.

OtherAll incidents which do not fit in one of the given categories should be put into this class.

If the number of incidents in this category increases, it is an indication that the classification scheme needs to be revised.

TRIAGE: CLASSIFICATION

INCIDENT HANDLING

Page 34: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE: RESPONSE LEVEL CLASSIFICATION

INCIDENT HANDLING

Criticality Level

Criticality LevelDefinition

Typical Incident Categories

Initial Response Time

Ongoing Response (Critical Phase)

Ongoing Response (Resolution Phase)

Ongoing Communication Requirement

1 Incident affecting critical systems or information with potential to be revenue or customer impacting.

Denial of service

Compromised Asset (critical)

Internal Hacking (active)

External Hacking (active)

Virus / Worm (outbreak)

Destruction of property (critical)

60 Minutes

CIRT Incident Manager assigned to work case on 24x7 basis.

CIRT Incident Manager assigned to work on case during normal business hours.

Case update

sent to appropriate parties on a daily basis during critical phase. If CSIRT involvement is necessary to restore critical systems to service then case update will be sent a minimum of every 2 hours.

Page 35: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE: RESPONSE LEVEL CLASSIFICATION

INCIDENT HANDLING

Criticality Level

Criticality LevelDefinition

Typical Incident Categories

Initial Response Time

Ongoing Response (Critical Phase)

Ongoing Response (Resolution Phase)

Ongoing Communication Requirement

2 Incident affecting non-critical systems or information, not revenue or customer impacting. Employee investigations that are time sensitive should typically be classified at this level.

Internal Hacking (not active)

External Hacking (not active)

Unauthorized access.

Policy violations

Unlawful activity.

Compromised information.

Compromised asset. (non-critical)

4 Hours CIRT Incident Manager assigned to work case on 24x7 basis.

CIRT Incident Manager assigned to work on case during normal business hours.

Case update sent to appropriate parties on a daily basis during critical phase.

Case update sent to appropriate parties on a weekly basis during resolution phase.

Page 36: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE: RESPONSE LEVEL CLASSIFICATION

INCIDENT HANDLING

Criticality Level

Criticality LevelDefinition

Typical Incident Categories

Initial Response Time

Ongoing Response (Critical Phase)

Ongoing Response (Resolution Phase)

Ongoing Communication Requirement

3 Possible incident, non-critical systems. Incident or employee investigations that are not time sensitive. Long-term investigations involving extensive research and/or detailed forensic work.

Email

Forensics Request

Inappropriate use of property.

Policy violations.

48 Hours Case is worked as CIRT time/resources are available.

Case is worked as CIRT time/resources are available.

Case update sent to appropriate parties on a weekly basis.

Page 37: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

TRIAGE: SENSITIVITY CLASSIFICATION

INCIDENT HANDLING

Sensitivity Level

Sensitivity LevelDefinition

Typical Incident Categories Required OnCase Communication

Optional OnCase Communication

ITS Access

1 Extremely Sensitive.

Global Investigations Initiated.

Forensics Request Destruction of property. Compromised asset. Compromised

information. Unlawful activity. Inappropriate use of

property. Policy violations

CIRT, CPOC CIRTM CIRT, CIRTM

2 Sensitive. External Hacking Internal Hacking Unauthorized Access

CIRT, CPOC Security Operations, OWNERS

Security Operations

3 Not Sensitive. Denial of service. Virus / Worm Email

CIRT, CPOC ANY ALL Agents in ITS

Page 38: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT HANDLING

IDENTIFICATION & ANALYSIS

Page 39: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

• Assign a handler in charge of responding / handling the incident

• Collect / Gather evidence

• Audit trail, log files, contents of files…

• Survey situation on victim site

• Identify

• What, Who, When, Why, How

IDENTIFICATION & ANALYSIS

INCIDENT HANDLING

Page 40: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

IDENTIFICATION & ANALYSIS

INCIDENT HANDLING

Incident Analysis

• Profile Network and Systems

• Understand Normal Behaviours

• Use Centralized logging and Create a Log Retention Policy

• Perform Event Correlation

• Keep All Host Clocks Synchronized

• Maintain and Use a Knowledgebase of Information

• Use Internet Search Engines for Research

• Run Packet Sniffers to Collect Additional Data

• Consider Filtering the Data

• Consider Experience as Being Irreplaceable

• Create a Diagnosis Matrix for Less Experienced Staff

• Seek Assistance From Others

Page 41: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

IDENTIFICATION & ANALYSIS

INCIDENT HANDLING

Evidence Collection and Archiving (RFC 3227)

• Order of Volatility

• Registers

• Routing table

• Temporary file systems

• Disk

• Remote logging

• Physical configuration

• Archival media

• Things to avoid

• It's all too easy to destroy evidence (fragile).

• Privacy Considerations

• Respect the privacy rules

• Do not intrude on people’s privacy without strong justification

• Make user backing of procedure that company’s established.

• Legal Considerations

• Computer evidence needs to be Admissible, Authentic, Complete, Reliable and Believable.

Page 42: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT HANDLING

CONTAINMENT

Page 43: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

CONTAINMENT

INCIDENT HANDLINGCreating a containment strategy

• Shut down system

• Disconnect System/PC from network

• Disable certain functions

Means of Containment

Type of incident

Strategy for virus infection and the strategy for denial of service attack are not the same.

Page 44: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

Criteria for determining the strategy include:

• Potential damage to resource

• Theft of resources

• Need for evidence preservation

• Service availability

• (e.g.) Network connectivity, service provided to others

• Time and recourses needed to implement the strategy

• Effectiveness of the strategy

• (e.g.) Partial or full containment

• Duration of the solution

• (e.g.) To be removed in several week

CONTAINMENT

INCIDENT HANDLING

Page 45: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

Delayed containment is usually NOT good.

• Need additional evidence to do containment?

• Need to get approval from legal section?

• If so (above), attacker could escalate unauthorized access / compromise other system in

short time…

Other potential issues

• Some attacks may cause additional damage when contained (e.g. disconnected).

CONTAINMENT

INCIDENT HANDLING

Page 46: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT HANDLING

ERADICATION & RECOVERY

Page 47: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

Determine case & origin of incident by Evidence

Especially, the detailed log should be kept for all evidences, including:

• Identifying information

• Location

• serial number

• host name

• MAC address

• IP address

• Name

• Title

• phone number

• Time and date

• Including time zone

• Location where evidence was stored

ERADICATION & RECOVERY

INCIDENT HANDLING

REFERENCERFC 2337 “Evidence Collection and Archiving

Page 48: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

Example of eradication

• Delete malicious code

• Disable breached user account

Restore the system

• Rebuild systems from scratch

• Replace compromised files with clean versions

• Install patches

• Change passwords

• Tighten network perimeter security

• Configuration of firewall & router

• Higher levels of system logging or network monitoring

ERADICATION & RECOVERY

INCIDENT HANDLING

Page 49: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

ERADICATION & RECOVERY

INCIDENT HANDLING

Which method would you recommend?

1)There is a rootkit inside a particular computer.

2)Your nations tourism department website has been defaced.

3)The email address of all the users in the prime ministers office has been leaked out.

Page 50: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

INCIDENT HANDLING

FOLLOW UP

Page 51: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

FOLLOW UP: DOCUMENTATION

INCIDENT HANDLING

Document what occurred in detail, including:

• Unique incident tracking number

• To track all information and actions relating to the incident

• Keywords or categorization

• Information to characterize the incident

• Establish relationships between difference incidents

• Contact information

• Name, Phone number, Email address, Other Contact information for all parties

• Policies

• Legal parameters or policies that the way incident might be handled

Page 52: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

FOLLOW UP: DOCUMENTATION

INCIDENT HANDLING

• Incident history

• Chronicle of all email and other correspondence

• Status

• Current status of the incident

• Actions

• List of past, current, and future actions to be taken

• Incident coordinator

• A team may choose to assign a staff member to coordinate the response to this

incident

• Quality assurance parameters

• Information that might help to measure the quality of the service

Page 53: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

FOLLOW UP: COMMUNICATION

INCIDENT HANDLING

Ensure that the restored system is no longer vulnerable to the same attack type.

• Monitor the restored system.

• Provide the updated information, including:

• Relevant incident

• Vulnerability patch

• Security patch

• Different solution

Page 54: COMPUTER SECURITY INCIDENT · PDF fileCOMPUTER SECURITY INCIDENT ... Categorization Priority Human Resource Relevance ... Sniffing Observing and recording of network traffic

FOLLOW UP: SELF LEARNING

INCIDENT HANDLING

Lesson Learned

• Post-mortem after the incident is resolved.

• The meeting is helpful in improving security measures and the incident handling process

itself.

• Assess time and resources used and damage incurred.

• Update policy and procedures as necessary.

• Update knowledgebase.

Be prepared for media inquiries